Results 11 to 20 of about 139,452 (290)
Cyber-Threat Information-Sharing Standards: A Review of Evaluation Literature
Cyber-threat information-sharing tools, through which cybersecurity teams share threat information, are essential to combatting today's increasingly frequent and sophisticated cyber-attacks.
Nenekazi N. P. Mkuzangwe +1 more
doaj +3 more sources
Methodological Framework to Collect, Process, Analyze and Visualize Cyber Threat Intelligence Data
Cyber attacks have increased in frequency in recent years, affecting small, medium and large companies, creating an urgent need for tools capable of helping the mitigation of such threats.
Lucas José Borges Amaro +5 more
doaj +1 more source
Threat Trekker: An Approach to Cyber Threat Hunting
I am disseminating this outcome to all of you, despite the fact that the results may appear somewhat idealistic, given that certain datasets utilized for the training of the machine learning model comprise simulated ...
Ángel Casanova Bienzobas +1 more
openaire +2 more sources
IMDfence: Architecting a Secure Protocol for Implantable Medical Devices
Over the past decade, focus on the security and privacy aspects of implantable medical devices (IMDs) has intensified, driven by the multitude of cybersecurity vulnerabilities found in various existing devices. However, due to their strict computational,
Muhammad Ali Siddiqi +2 more
doaj +1 more source
This study examines the phenomenon of disinformation as a threat in the realm of cybersecurity. We have analyzed multiple authoritative cybersecurity standards, manuals, handbooks, and literary works. We present the unanimous meaning and construct of the
Kevin Matthe Caramancion +3 more
doaj +1 more source
SYNERGY OF MULTI-STAKEHOLDERS IN DEFENDING INDONESIA FROM CYBER THREATS
This paper argues that currently the threat of cyber-attacks has become a real threat that has the potential to develop in Indonesia. With the presence of these cyber-attacks, the government must take advantage of the synergy between state multi-stake ...
Aththaariq Rizki +1 more
doaj +1 more source
The Internet enables users to access vast resources, but it can also expose users to harmful cyber-attacks. This paper investigates human factors issues concerning the use of sounds in a cyber-security domain. It describes a methodology, referred to as sonification, to effectively design and develop auditory cyber-security threat indicators to warn ...
Akbar Siami Namin +3 more
openaire +2 more sources
INDONESIA FACING THE THREAT OF CYBER WARFARE: A STRATEGY ANALYSIS
The threat of cyber warfare may disturb Indonesia's national interests. For this reason, efforts to create cyber defense forces are essential in dealing with the threat of cyberwar in this technological age.
Ahmad Candra +2 more
doaj +1 more source
Evidential Cyber Threat Hunting
A formal cyber reasoning framework for automating the threat hunting process is described. The new cyber reasoning methodology introduces an operational semantics that operates over three subspaces -- knowledge, hypothesis, and action -- to enable human-machine co-creation of threat hypotheses and protective recommendations.
Frederico Araujo +4 more
openaire +2 more sources
Cyber Insurance – Effective Mechanism for Protection against Cyber Threat
Cyber insurance is a rapidly developing area which draws more and more attention of practitioners and researchers. Insurance, an alternative way to deal with residual risks, was only recently applied to the cyber world.
Nana Shonia +2 more
doaj +1 more source

